Microsoft recently faced critical vulnerabilities in on-premises SharePoint servers that have been actively exploited in the wild.
To mitigate these threats, Microsoft issued customer guidance and released security updates for CVE-2025-53770 and CVE-2025-53771, covering all supported SharePoint versions.
In this month’s campaign, we’re dissecting this multi-stage exploit chain, known as the ToolShell campaign.
Let’s dig in.
In mid-2025, researchers and threat actors identified a set of vulnerabilities, known as the ToolShell campaign, potentially impacting thousands of organizations.
This led to the disclosure of CVE-2025-53770 and CVE-2025-53771, enabling remote code execution and the leak of cryptographic keys in on-premises SharePoint servers.

According to Microsoft Security Response Center (MSRC), these vulnerabilities apply to on-prem SharePoint Servers only, while SharePoint Online in Microsoft 365 is unaffected. The affected on-premises versions of Microsoft SharePoint Server are:
The ToolShell attacks have been attributed to Chinese state-backed threat groups, such as Linen Typhoon and Violet Typhoon, known for espionage and intellectual property theft.
Recent reports also show that ransomware gangs, including Storm-2603, have joined the campaign, deploying Warlock ransomware through the SharePoint vulnerability chain.

This campaign breaks down the entire exploitation flow and highlights how easily misconfigured or unpatched SharePoint servers can become an open door into the enterprise network.
Access the full spotlight above to learn: